Debian FTP Masters
2022-Nov-16 13:22 UTC
[Pkg-xen-devel] xen_4.16.2+90-g0d39a6d1ae-1_source.changes ACCEPTED into unstable
Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 16 Nov 2022 12:50:33 +0100 Source: xen Architecture: source Version: 4.16.2+90-g0d39a6d1ae-1 Distribution: unstable Urgency: medium Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org> Changed-By: Hans van Kranenburg <hans at knorrie.org> Changes: xen (4.16.2+90-g0d39a6d1ae-1) unstable; urgency=medium . * Update to new upstream version 4.16.2+90-g0d39a6d1ae, which also contains security fixes for the following issues: - Xenstore: guests can let run xenstored out of memory XSA-326 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313 CVE-2022-42314 CVE-2022-42315 CVE-2022-42316 CVE-2022-42317 CVE-2022-42318 - Arm: unbounded memory consumption for 2nd-level page tables XSA-409 CVE-2022-33747 - P2M pool freeing may take excessively long XSA-410 CVE-2022-33746 - lock order inversion in transitive grant copy handling XSA-411 CVE-2022-33748 - x86: unintended memory sharing between guests XSA-412 CVE-2022-42327 - Xenstore: Guests can crash xenstored XSA-414 CVE-2022-42309 - Xenstore: Guests can create orphaned Xenstore nodes XSA-415 CVE-2022-42310 - Xenstore: Guests can cause Xenstore to not free temporary memory XSA-416 CVE-2022-42319 - Xenstore: Guests can get access to Xenstore nodes of deleted domains XSA-417 CVE-2022-42320 - Xenstore: Guests can crash xenstored via exhausting the stack XSA-418 CVE-2022-42321 - Xenstore: Cooperating guests can create arbitrary numbers of nodes XSA-419 CVE-2022-42322 CVE-2022-42323 - Oxenstored 32->31 bit integer truncation issues XSA-420 CVE-2022-42324 - Xenstore: Guests can create arbitrary number of nodes via transactions XSA-421 CVE-2022-42325 CVE-2022-42326 - x86: Multiple speculative security issues XSA-422 CVE-2022-23824 * Note that the following XSA are not listed, because... - XSA-413 applies to XAPI which is not included in Debian * Drop the "x86/CPUID: surface suitable value in EBX of XSTATE subleaf 1" patch again because it's included in upstream changes now. Checksums-Sha1: 98c58645c2743ce9918303296e83fff2ebbe7190 4156 xen_4.16.2+90-g0d39a6d1ae-1.dsc 3953c243b347c0278588da55764087d1c34589ba 4570012 xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz e163089685aa9ac252f4084f08c60ba614e9228f 131620 xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz Checksums-Sha256: 584de011263c53fb724bd57b7a468a38d210569a91a8a0ce6fcba614c436516c 4156 xen_4.16.2+90-g0d39a6d1ae-1.dsc 86ee16efa5745145b5a9712b38fb84f80d1d811a7f034342749eddd2a396a91d 4570012 xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz 3a901188068a0059a81f7e2c2f680b07267774b2860f90125a9e623e12bc6bbf 131620 xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz Files: 7900eba5f374ee35eff9f0bfefe0110d 4156 admin optional xen_4.16.2+90-g0d39a6d1ae-1.dsc 28922c06f0daf28512f86cc747d26aeb 4570012 admin optional xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz d4c1b8a5c5628f96aac8e0ea83adefc7 131620 admin optional xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEESWyddwNaG9637koYssHfcmNhX2wFAmN03a4ACgkQssHfcmNh X2xG5w/9EYLc4HlZo7wbhceWP32N1Le45lVZKztoiAw7GrnfNOMesCUrLwDLVCaC KAMnBXAMv9phc9C14ILgGervknK9LPnnifWtu+SoHuRAFB4q9bVbPugw78/cTCKz ZOe8pack+Ku6gqnuAcQV25yGOXw6zRPZtvkH8K/ZxzfWp0S2mYJihbwePp1qsWHZ 284ZGvMrTHoscZn1ZCQxp8ogQdPB3J8Eg0Q70j5UryxnVChXDIXo74DQtuGIXD/d 7w3YeZC5OM9yvT0eS0OHs6N2/rDcZfoI5rkIo+l+VAanXIxTzgqCbYzt+6okvIxj nDhEcIOA6b1dr2oFTQaGHdlUgi9EB6l6sgK2QnxAu9PZxm29i0H8up1knK9cN+uz AnFwMpy/7TTTBvRBIpleeoFVtS7RPaOdZW4qXE+rIoC5lgkC67RDqFgd2UINRxi6 AGmDsX2LEc4y9erBC3T77ICQWzu0YzB0bhWem5MkCWer1C5oc8aB9EWcO9GqApqg /Ji9U2pSxjihcLilKmL2O9aIRvsxQ1oDDe8lJuOhA+r7fSaU5CMKZQXhWt/HrW+2 fKRAGy17Lr6G3eWM3W5VBdGsz0WuxY/QmMqdJFbJTIGU1ROLeYpJrMXeP/yX35qK Iop6qioK4D+GhnApaaSgCIK1ZrrXSK6IlZjR5XZ7cAn+U+G2tMg=t9Ji -----END PGP SIGNATURE----- Thank you for your contribution to Debian.